CVE-2025-3284: CWE-352 Cross-Site Request Forgery (CSRF) in WPEverest User Registration PRO – Custom Registration Form, Login Form, and User Profile WordPress Plugin
The User Registration & Membership – Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.1.3. This is due to missing or incorrect nonce validation on the user_registration_pro_delete_account() function. This makes it possible for unauthenticated attackers to force delete users, including administrators, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-3284 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the WPEverest User Registration PRO WordPress plugin, specifically versions up to and including 5.1.3. The vulnerability arises from missing or incorrect nonce validation in the user_registration_pro_delete_account() function. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Due to the absence or improper implementation of nonce checks, an unauthenticated attacker can craft a malicious request that, when executed by an authenticated site administrator (or any user with sufficient privileges), can trigger the deletion of user accounts, including those with administrative rights. This attack vector requires social engineering tactics, such as tricking an administrator into clicking a specially crafted link or visiting a malicious webpage. The vulnerability impacts all versions of the plugin up to 5.1.3, and no official patches or updates have been linked yet. Although there are no known exploits in the wild at the time of this report, the nature of the vulnerability poses a significant risk to the integrity and availability of user accounts on affected WordPress sites. The plugin is widely used for managing user registrations, logins, and profiles, making this vulnerability particularly concerning for websites relying on it for membership or user management functionalities. The attack does not require the attacker to be authenticated but does require victim user interaction, specifically from users with elevated privileges, to succeed.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on WordPress sites with the WPEverest User Registration PRO plugin for critical user management functions. Successful exploitation can lead to unauthorized deletion of user accounts, including administrators, resulting in loss of administrative control, potential site defacement, disruption of services, and exposure to further attacks due to compromised site integrity. This can affect confidentiality if user data is lost or manipulated, integrity through unauthorized account deletions, and availability by disabling administrative access or user accounts. Organizations in sectors such as e-commerce, education, government, and membership-based services are particularly at risk, as they often rely on WordPress for front-facing portals and internal user management. The social engineering aspect means that phishing or targeted attacks against site administrators could be leveraged, increasing the risk profile. Additionally, the lack of patches means organizations must proactively mitigate the risk. The vulnerability could also lead to reputational damage and regulatory compliance issues under GDPR if user data integrity and availability are compromised.
Mitigation Recommendations
1. Immediate mitigation should include restricting administrative access to trusted networks and enforcing multi-factor authentication (MFA) for all administrator accounts to reduce the risk of successful social engineering. 2. Administrators should be trained to recognize and avoid suspicious links or requests, especially those that could trigger account deletions. 3. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting the user_registration_pro_delete_account() endpoint or similar plugin-specific URLs. 4. Temporarily disable or deactivate the User Registration PRO plugin if feasible until a patch is released. 5. Monitor server and application logs for unusual account deletion activities or unexpected POST requests. 6. Regularly back up user data and site configurations to enable quick restoration in case of compromise. 7. Engage with the plugin vendor or community to obtain updates or patches as soon as they become available and apply them promptly. 8. Consider deploying Content Security Policy (CSP) headers to limit the execution of unauthorized scripts that could facilitate CSRF attacks. 9. Use security plugins that add additional nonce validation or CSRF protections as a stopgap measure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-3284: CWE-352 Cross-Site Request Forgery (CSRF) in WPEverest User Registration PRO – Custom Registration Form, Login Form, and User Profile WordPress Plugin
Description
The User Registration & Membership – Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.1.3. This is due to missing or incorrect nonce validation on the user_registration_pro_delete_account() function. This makes it possible for unauthenticated attackers to force delete users, including administrators, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-3284 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the WPEverest User Registration PRO WordPress plugin, specifically versions up to and including 5.1.3. The vulnerability arises from missing or incorrect nonce validation in the user_registration_pro_delete_account() function. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Due to the absence or improper implementation of nonce checks, an unauthenticated attacker can craft a malicious request that, when executed by an authenticated site administrator (or any user with sufficient privileges), can trigger the deletion of user accounts, including those with administrative rights. This attack vector requires social engineering tactics, such as tricking an administrator into clicking a specially crafted link or visiting a malicious webpage. The vulnerability impacts all versions of the plugin up to 5.1.3, and no official patches or updates have been linked yet. Although there are no known exploits in the wild at the time of this report, the nature of the vulnerability poses a significant risk to the integrity and availability of user accounts on affected WordPress sites. The plugin is widely used for managing user registrations, logins, and profiles, making this vulnerability particularly concerning for websites relying on it for membership or user management functionalities. The attack does not require the attacker to be authenticated but does require victim user interaction, specifically from users with elevated privileges, to succeed.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on WordPress sites with the WPEverest User Registration PRO plugin for critical user management functions. Successful exploitation can lead to unauthorized deletion of user accounts, including administrators, resulting in loss of administrative control, potential site defacement, disruption of services, and exposure to further attacks due to compromised site integrity. This can affect confidentiality if user data is lost or manipulated, integrity through unauthorized account deletions, and availability by disabling administrative access or user accounts. Organizations in sectors such as e-commerce, education, government, and membership-based services are particularly at risk, as they often rely on WordPress for front-facing portals and internal user management. The social engineering aspect means that phishing or targeted attacks against site administrators could be leveraged, increasing the risk profile. Additionally, the lack of patches means organizations must proactively mitigate the risk. The vulnerability could also lead to reputational damage and regulatory compliance issues under GDPR if user data integrity and availability are compromised.
Mitigation Recommendations
1. Immediate mitigation should include restricting administrative access to trusted networks and enforcing multi-factor authentication (MFA) for all administrator accounts to reduce the risk of successful social engineering. 2. Administrators should be trained to recognize and avoid suspicious links or requests, especially those that could trigger account deletions. 3. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting the user_registration_pro_delete_account() endpoint or similar plugin-specific URLs. 4. Temporarily disable or deactivate the User Registration PRO plugin if feasible until a patch is released. 5. Monitor server and application logs for unusual account deletion activities or unexpected POST requests. 6. Regularly back up user data and site configurations to enable quick restoration in case of compromise. 7. Engage with the plugin vendor or community to obtain updates or patches as soon as they become available and apply them promptly. 8. Consider deploying Content Security Policy (CSP) headers to limit the execution of unauthorized scripts that could facilitate CSRF attacks. 9. Use security plugins that add additional nonce validation or CSRF protections as a stopgap measure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-04T15:33:23.745Z
- Cisa Enriched
- true
Threat ID: 682d984bc4522896dcbf7e97
Added to database: 5/21/2025, 9:09:31 AM
Last enriched: 6/20/2025, 2:05:53 PM
Last updated: 8/4/2025, 8:41:35 AM
Views: 15
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.